Block chain archive verification system

文档序号:1492639 发布日期:2020-02-04 浏览:6次 中文

阅读说明:本技术 区块链档案验证系统 (Block chain archive verification system ) 是由 林哲民 于 2018-07-24 设计创作,主要内容包括:本发明揭露一种区块链档案验证系统,该系统包含传送端及接收端;该传送端可将档案文件存入网络服务器所联结的区块链,传送端将档案文件存入网络服务器所联结的区块时同时写入一组加密值,若档案文件遭受到恶意修改时,该加密值即会改变,接收端可以核对加密值是否一致,进而作为档案文件是否为原始的验证机制。(The invention discloses a block chain file case verification system, which comprises a transmitting end and a receiving end; the transmitting end can store the file into the block chain connected with the network server, and the transmitting end writes a group of encrypted values when storing the file into the block connected with the network server, if the file is maliciously modified, the encrypted values will be changed, and the receiving end can check whether the encrypted values are consistent, so as to be used as an original verification mechanism for the file.)

1. A block chain file verification system comprises a transmitting end and a receiving end; the transmission end stores the file into the blocks connected with the network server, and the blocks are linked in series according to the adjacent blocks to establish a block chain; the archive file only allows the receiving end which is obtained the secret key to open; the method is characterized in that: when the transmitting end stores the file into the block connected with the network server, a group of encrypted values are written in at the same time, if the file is maliciously modified, the encrypted values will be changed, and the receiving end can check whether the encrypted values are consistent or not, so that the receiving end can be used as a verification mechanism for judging whether the file is original or not.

2. The blockchain file verification system of claim 1, wherein the sending end stores the file into the block associated with the network server and writes a set of cryptographic values into the block, the cryptographic values being formed by a random default or custom function of the systematic random number.

Technical Field

The present invention relates to a system for verifying a blockchain file, and more particularly, to a system for verifying a blockchain file, which uses a blockchain format to create a file and adds an encryption value while writing the file, thereby increasing security.

Background

The blockchain is a decentralized database in nature, and refers to a technical scheme for maintaining a reliable database collectively. Therefore, the block chain technology does not depend on a third party, and a technical scheme for storing, verifying, transmitting and exchanging network data is carried out through self distributed nodes. The field of the block chain technology can be multiple fields such as contracts, electronic commerce, internet of things, social communication, file storage, existence certification, identity verification, financial transactions and the like. From the financial point of view, the block chain technology is regarded as a distributed open decentralized large-scale network account book, anyone and any time can add own information by adopting the same technical standard, extend the block chain and continuously meet the data logging requirements brought by various requirements, and thus, everyone in the system has a complete database; this approach we call it blockchain technique. The block chain technology is decentralized, so that the block chain technology is independent of an additional third-party management mechanism or hardware facilities, has no central control, realizes self-verification, transmission and management of information by each node through distributed accounting and storage except for an integrated block chain, and is the most prominent and essential characteristic of the block chain. As long as more than half of all data nodes cannot be mastered, network data cannot be arbitrarily manipulated and modified, so that the block chain per se becomes relatively safe, and artificial data change is avoided.

However, in the secure communication field of the network, three basic security requirements, such as integrity, source authentication, and confidentiality, should be satisfied at the same time to ensure that the message is secure during the communication transmission process. Integrity means that the receiver of the message must be able to ensure that the content of the received message is consistent with the content of the message transmitted by the transmitter, i.e., the content of the message has not been tampered with. Source verification means that the recipient of the message must be able to verify that the message was indeed sent by the intended sender. Confidentiality means that the message will not be accessed by the third party during the delivery process. In network communication, a key encryption method is often used as a mechanism for secure communication. The transmitting side and the receiving side agree with a key in advance, the message to be transmitted is encrypted by using a key encryption algorithm, and after the receiving side receives the file, the file is decrypted by using the same key, so that the message transmitted by the transmitting side in advance is obtained. If the attacker cracks the key, the receiver cannot determine the authenticity of the obtained message, especially when the original message to be transmitted by the transmitter is a program, server content or other unidentifiable message, and the receiver cannot detect the abnormality of the decrypted message after receiving the tampered file.

When the security requirement of confidentiality cannot be met, the integrity and source authentication cannot be met; to solve the above problems, various methods are available. For example, a secure data transmission layer mechanism is adopted for transmission, multiple keys are set to increase decryption difficulty and the like; the solution in the prior art has the problem of time consuming calculation, and when the data volume of the message to be encrypted is large, the time consumption of the overflow is still a non-negligible burden for the general user. In view of the above, how to satisfy the security requirement of the block chain file, and achieve the objective conveniently and simply is the subject to be solved by the present invention.

Disclosure of Invention

The invention provides a system for verifying a block chain file, which stores a file by using a block chain concept, and adds a set of encrypted values while writing the file, wherein the encrypted values can be changed along with the falsification of the file, thereby achieving the purpose of increasing the security requirement of block-based file management.

In order to achieve the purpose of the previous disclosure, the invention adopts the technical scheme that: a block chain file verification system comprises a transmitting end and a receiving end; the transmission end stores the file into the blocks connected with the network server, and the blocks are linked in series according to the adjacent blocks to establish a block chain; the archive file only allows the receiving end which is obtained the secret key to open; when the file is stored in the block connected with the network server, the transmitting end writes a group of encrypted values, if the file is maliciously modified, the encrypted values will be changed, and the receiving end can check whether the encrypted values are consistent or not, so as to be used as a verification mechanism for judging whether the file is original or not.

The transmitting end stores the file into the block connected with the network server and writes a group of encrypted values into the block, and the encrypted values are formed by a random default or self-defined function of the system random number.

Drawings

FIG. 1 is a system diagram of an embodiment of the present invention.

Description of the symbols:

10 transport end

11 archive file

12 blocks

13 Block chain

14 key

15 encrypted value

20 receiving end.

Detailed Description

The foregoing and other objects, features, and advantages of the invention will be apparent from the following more particular description of preferred embodiments, as illustrated in the accompanying drawings. In addition, before the present invention is described in detail, it is to be understood that the same is by way of illustration and example only and is not to be taken by way of limitation.

The structure and the effect achieved by the invention are described as follows by matching with the drawing:

please refer to fig. 1, which is a system diagram of an embodiment of the present invention. The invention relates to a block chain file verification system, in particular to an electronic file verification system based on a block chain form, which comprises a transmitting end 10 and a receiving end 20.

The sender 10 can store the file 11 in a block 12 associated with the network server, and the block 12 is linked by adjacent blocks 12 to establish a block chain 13. The blockchain 13 (blockchain) is a distributed database that uses cryptographically associated data blocks that are written to the contents of the archive 11 to generate data for a data block. Since the blockchain 13 is mostly public information, each node in the blockchain 13 network can obtain any data in the blockchain 13, therefore, the sender 10 must add the identification data of the node related to the record content in the data block, so that the medical record content in the data block is only allowed to be obtained by the receiver 20 that obtains the key 14. In addition, when the sending end 10 stores the file 11 into the block 12 associated with the network server, a set of cryptographic values 15 is written, mainly by using the characteristic that the block chain 13 is not tampered, and if the file 11 is maliciously modified, the cryptographic values 15 will be changed. The aforementioned secret 15 may be formed by a system random number random default or custom function.

The receiving end 20 can obtain a secret key 14 from the transmitting end 10, and utilize the secret key 14 to obtain the archive file 11 in the blockchain 13 linked by the network server, the receiving end 20 can check whether the current encryption value 15 is consistent with the previously written encryption value, if so, the archive file 11 can be considered not to be tampered, otherwise, if the current encryption value 15 is different from the previously written encryption value 15, the archive file 11 can be judged to be tampered; thereby determining whether the archive file 11 is the original authentication mechanism.

The file 11 is stored by the proposed block chain 13, so that the file 11 has a safer storage environment; in particular, when the sending end 10 stores the file 11 into the block 12 associated with the network server, a set of encryption values 15 is written at the same time, so that the receiving end 20 can check whether the file 11 is tampered by checking the difference of the encryption values 15, thereby maintaining the integrity and security of the file 11.

The following gains will be achieved by the implementation of the verification system described above:

1. the transmitting end 10 stores the file 11 in the block chain 13, providing a safe and complete access service, and substantially improving the quality of file storage.

2. The receiving end can check whether the encryption value 15 is consistent when opening the archive, and further serve as a verification mechanism for judging whether the archive 11 is falsified.

Although the system structure is simple, the information is stable and high in safety, and the practical efficiency is effectively improved; in particular, the receiving end has a verification mechanism for checking the authenticity of the file 11, so that the file is more secure in transmission and use. Accordingly, many modifications and variations may be resorted to by the above disclosure or teachings, and equivalents thereof may be resorted to, falling within the scope of the invention.

From the foregoing detailed description of the preferred embodiments, it is intended that the features of the invention be clearly described, rather than being limited by the foregoing disclosed embodiments. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention; the invention has many advantages and remarkable practical characteristics, and the technical means and the structural characteristics thereof are developed by the inventor of the present invention, the manufacturing method is not seen in the workshop, the invention accords with the requirements of the patent, is applied by law and prays the patented patent right.

6页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:网络请求处理方法和装置

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类